CN108108112A - A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing - Google Patents
A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN108108112A CN108108112A CN201711347330.8A CN201711347330A CN108108112A CN 108108112 A CN108108112 A CN 108108112A CN 201711347330 A CN201711347330 A CN 201711347330A CN 108108112 A CN108108112 A CN 108108112A
- Authority
- CN
- China
- Prior art keywords
- password
- present bit
- present
- input
- bit password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses a kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing, for improving the accuracy of the Password Input of the small screen touch control device and efficiency.Present invention method includes:Obtain present bit password input by user;Whether correct detect present bit password;If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
Description
Technical field
The present invention relates to field of terminal technology more particularly to a kind of cipher-code input methods and device, computer installation, readable
Storage medium.
Background technology
At present, when inputting password on the smaller electronic equipment in some touch areas, such as smartwatch is defeated due to password
Entering touch area will not occur to change relatively, and the touch-control area of electronic equipment in itself is smaller, then is easy to cause password in electronics
Input error in equipment, meanwhile, some limitation users input password number electronic equipment in, when user repeatedly input it is close
After code mistake, it will cause electronic equipment that can not continue to unlock whithin a period of time and use, seriously affected user experience.
The content of the invention
An embodiment of the present invention provides a kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing, are used for
Improve the accuracy and efficiency of the Password Input of the small screen touch control device.
In view of this, first aspect present invention provides a kind of cipher-code input method, applied to terminal, it may include:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
Further, after whether detection present bit password is correct, method further includes:
When present bit password mistake, and when present bit password is the first password, then keep all positions after the first password close
The preset touch response region of code is constant or, according to the default of all passwords after the first password of the second preset rules reduction
Touch-control response region.
Further, before present bit password input by user is obtained, method further includes:
When present bit password is the first password, keep the preset touch response region of the first password constant or, according to the
The preset touch response region of the first password of one preset rules increase.
Further, method further includes:
Present bit password is converted into invisible form;
Present bit password is shown according to invisible form.
Further, before present bit password is converted to invisible form, method further includes:
Authentication is carried out to user;
If authentication is not by triggering the step of present bit password is converted to invisible form.
Second aspect of the present invention provides a kind of cipher input, applied to terminal, it may include:
Acquiring unit, for obtaining present bit password input by user;
Whether detection unit is correct for detecting present bit password;
Increasing unit, for when current password is correct, then increasing the next of present bit password according to the first preset rules
The preset touch response region of position password.
Further, device further includes:
First processing units for working as present bit password mistake, and when present bit password is the first password, then keep the first
The preset touch response region of all passwords after password is constant or, after reducing the first password according to the second preset rules
The preset touch response region of all passwords.
Further, device further includes:
Second processing unit, for when present bit password is the first password, keeping the preset touch response of the first password
Region is constant or, increases the preset touch response region of the first password according to the first preset rules.
Further, device further includes:
Converting unit, for present bit password to be converted to invisible form;
Display unit, for showing present bit password according to invisible form.
Further, device further includes:
Authentication unit, for carrying out authentication to user;
Trigger element, for when authentication not by when, then triggering that converting unit is converted to present bit password can not
See form.
Third aspect present invention provides a kind of computer installation, and computer installation includes processor, and processor is used to perform
During the computer program stored in memory, following steps are realized:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
Fourth aspect present invention provides a kind of computer readable storage medium, is stored thereon with computer program, computer
When program is executed by processor, following steps are realized:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
As can be seen from the above technical solutions, the embodiment of the present invention has the following advantages:
An embodiment of the present invention provides a kind of cipher-code input method, the correctness of the present bit password by detecting input,
The preset touch response region of the next bit password of present bit password when present bit password is correct, can be increased, so as to significantly
Increase the serious forgiveness of the next bit password for present bit password of knowing clearly, and improve the click accuracy of Password Input, also avoid
Password input efficiency caused by due to multiple input error it is low.
Description of the drawings
Fig. 1 is cipher-code input method one embodiment schematic diagram in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of cipher-code input method in the embodiment of the present invention;
Fig. 3 is another embodiment schematic diagram of cipher-code input method in the embodiment of the present invention;
Fig. 4 is cipher input one embodiment schematic diagram in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 7 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 8 is another embodiment schematic diagram of cipher input in the embodiment of the present invention;
Fig. 9 is Computer device one embodiment schematic diagram of the embodiment of the present invention.
Specific embodiment
An embodiment of the present invention provides a kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing, are used for
Improve the accuracy and efficiency of the Password Input of the small screen touch control device.
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention
The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects
It encloses.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned attached drawing, "
The (if present)s such as four " are the objects for distinguishing similar, without being used to describe specific order or precedence.It should manage
The data that solution so uses can exchange in the appropriate case, so that the embodiments described herein can be with except illustrating herein
Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment need not limit
In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production
The intrinsic other steps of product or equipment or unit.
For ease of understanding, the idiographic flow in the embodiment of the present invention is described below, referring to Fig. 1, the present invention is real
Applying cipher-code input method one embodiment in example includes:
101st, present bit password input by user is obtained;
In the present embodiment, terminal is equipped with the display screen of user's touch control operation, which can include but is not limited to mobile phone, puts down
Plate, wearable device etc. are particularly suitable for when carrying out Password Input, the smaller terminal in touch area of Password Input.When with
Family need to input password in terminal with carry out unlock, payment, into application program when operations when, can on the display screen of terminal
To show Password Input region and the code keyboard for input, user, can by clicking on the respective symbols on code keyboard
To realize input of the password in terminal.For user after mobile terminal inputs present bit password by touch control operation, terminal can as a result,
To obtain the present bit password input by user, and the present bit password can be shown in Password Input region.
102nd, whether correct present bit password is detected, if so, step 103 is performed, if it is not, then performing step 104;
In the present embodiment, after obtaining present bit password input by user, it is whether correct that present bit password can be detected.
Specifically, user can pre-set preset password before password is inputted, so as to being needed in user in terminal
Input password, when operations, can test password input by user to carry out unlock, payment, into application program
Card.It, can be by present bit password and correspondence position in corresponding preset password after obtaining present bit password input by user as a result,
Password compared, if present bit password is identical with the password of correspondence position in corresponding preset password, illustrate that user is defeated
The present bit password entered is correct, conversely, then illustrating present bit password mistake input by user.
103rd, the preset touch response region of the next bit password of present bit password is increased according to the first preset rules;
In the present embodiment, if detection present bit password is correct, present bit password can be increased according to the first preset rules
Next bit password preset touch region.
Specifically, if present bit password input by user is correct, illustrate the accuracy of all passwords input by user
It is improved, terminal may can be supported to perform unlock, payment, into functions such as application programs, then in order to improve
The accuracy of Password Input, to prevent the touch area due to Password Input it is smaller and caused by Password Input mistake, can increase
The preset touch response region of the next bit password of present bit password, reach increase present bit password next bit password it is fault-tolerant
The purpose of rate.
Assuming that the password of input is numerical ciphers, designed for the code keyboard of input for nine grids, if present bit password
For 6 and correct, then the next bit password of present bit password, such as 9, preset touch region can be according to the first preset rules
Increased accordingly, for example, can be centered on 9 original touch-control response region to one circle of outside increase, with increase 9
Original touch-control response region, for another example can toward 9 original touch-control response region to the right or to the left its broadening original touch-control response area
Domain can specifically set the first preset rules according to actual needs, make so that the preset touch region after increase can meet
With needs, do not limit herein.Wherein, which can be the gap between 9 and other numbers.
It should be noted that in the present embodiment, the next bit password of present bit password is correspondence position in preset password
Proper password, and any password that non-user inputs after present bit password is inputted, if for example, 9 be to correspond to position in preset password
The proper password put, then only can correspondingly increase 9 preset touch region, the preset touch region of other numbers will not increase
Greatly.
It is understood that in the present embodiment, after user inputs present bit password, such as second password, if having been carried out
The input of 3rd password, the preset touch region of that the 3rd corresponding proper password of password after increase, can recover to
The size in preset touch region originally, can be according to the correctness of present bit password, really with when inputting password next time
The preset touch response region of the fixed next bit password for whether needing to increase present bit password.
104th, other flows are performed.
In the present embodiment, if detection present bit password mistake, can not perform other operations, so that keeping currently
Password input mode.
It is understood that in the present embodiment, after present bit password mistake is detected, it is meant that all positions currently inputted
Password will be unable to that terminal is supported to perform corresponding function, then can also perform other operations, to change after present bit password extremely
The input mode of a few password so that user can rapidly input all passwords, and carry out the prompting of Password Input mistake,
Concrete mode does not limit herein.
In the present embodiment, the correctness of the present bit password by detecting input can increase when present bit password is correct
The preset touch response region of the next bit password of big present bit password, it is close so as to considerably increase the next bit of present bit password
The serious forgiveness of code, and improves the click accuracy of Password Input, also avoid password due to multiple input error and caused by
Input efficiency it is low.
Referring to Fig. 2, another embodiment of cipher-code input method includes in the embodiment of the present invention:
201st, when present bit password is the first password, keep the preset touch response region of the first password constant or, press
Increase the preset touch response region of the first password according to the first preset rules;
In the present embodiment, when user carries out Password Input using the smaller terminal in touch area, if user needs to input
Present bit password be the first password, then the preset touch response region that can keep the first password is constant, alternatively, can also be by
Increase the preset touch response region of the first password according to the first preset rules.
Specifically, the initiation codon of the first password all passwords as input, on the one hand, since the front is not close
Code input, thus can not decide whether to increase the preset touch response region of the first password, then the default of the first password touches
Control response region can remain unchanged, on the other hand, since its correctness determines the accuracy of all passwords of input,
If i.e. the first password input error, inputs password by mistake, and if the first Password Input is correct, input password have it is certain
Probability may be correct, then in order to further improve the accuracy of Password Input and efficiency, can correspondingly increase the first password
Preset touch response region, to improve the serious forgiveness of the first password, so that correct in the first Password Input, use
Family can input next bit may correct password.
In the present embodiment, the method for increasing the preset touch response region of the first password is referred to embodiment illustrated in fig. 1
The content that middle step 103 illustrates, details are not described herein again.
202nd, present bit password input by user is obtained;
203rd, whether correct present bit password is detected, if so, step 204 is performed, if it is not, then performing step 205;
204th, the preset touch response region of the next bit password of present bit password is increased according to the first preset rules;
Step 202 in the present embodiment is identical to step 103 with the step 101 in embodiment illustrated in fig. 1 to step 204,
Details are not described herein again.
205th, keep the preset touch response region of all passwords after the first password constant or, default according to second
The preset touch response region of all passwords after the first password of rule reduction.
In the present embodiment, when present bit password mistake, and when present bit password is the first password, the first password can be kept
The preset touch response region of all passwords afterwards is constant or, according to all after the first password of the second preset rules reduction
The preset touch response region of position password.
Specifically, after present bit password is as the first Password Input mistake, it is meant that all passwords of input by mistake,
No matter whether all passwords after present bit password input correctly for that, and will not all change all passwords input by user can not
Support terminal perform corresponding function as a result, the preset touch response area of all passwords after can then keeping the first password
Domain is constant, so that, it is necessary to follow the smaller terminal in touch area during other password of the user after the first password of input
Touch control operation, and after all Password Inputs, can send in time all password useless of input prompting or
Person can reduce the preset touch response region of all passwords after the first password further according to the second preset rules, with
Reducing the serious forgiveness of all passwords after the first password so that the input that user can quickly carry out next round password is attempted,
So as to improve the efficiency of Password Input.
Assuming that the password of input is numerical ciphers, designed for the code keyboard of input for nine grids, if present bit password
For 7 and mistake, then all passwords of present bit password, such as 14679, preset touch region can be default according to second
Rule reduced accordingly, illustrated by taking second password as an example, can centered on 1 original touch-control response region to
Inner periphery reduce one circle, with reduce 1 original touch-control response region, for another example can toward 1 original touch-control response region to the right or
Subtract its narrow original touch-control response region to the left, the second preset rules can be specifically set according to actual needs, so that after reducing
Preset touch region can meet using needs, do not limit herein.Wherein, the region of the reduction can be former for 1 part
Beginning touch-control response region.
It is understood that in the present embodiment, all passwords after the first password is reduced according to the second preset rules
Preset touch response region when, the preset touch response regions of all passwords after the first password can be sequentially reduced, i.e.,
Reduce the preset touch response region of next bit password after one password of input, can also reduce simultaneously all after the first password
The preset touch response region of position password, as long as determine the first password mistake of input, then all passwords are preset below
Touch-control response region synchronously reduces, and is not specifically limited herein.
Referring to Fig. 3, another embodiment of cipher-code input method includes in the embodiment of the present invention:
301st, when present bit password is the first password, keep the preset touch response region of the first password constant or, press
Increase the preset touch response region of the first password according to the first preset rules;
302nd, present bit password input by user is obtained;
Step 301 in the present embodiment is identical to step 202 with the step 201 in embodiment illustrated in fig. 2 to step 302,
Details are not described herein again.
303rd, authentication is carried out to user;
In the present embodiment, after user inputs present bit password, present bit password can be shown in Password Input region
Show, wherein, the display format of password has visible form (i.e. in plain text) and invisible form (i.e. dark text), and corresponding password is default
Touch-control response region can be increased or reduced accordingly, if being shown in a visible form, when the actual touch-control 3 of user and mistake
By mistake, when but being shown as 2 due to the preset touch response region increase of proper password 2, extracting for password may be caused, then be
Ensure the security of Password Input, prevent password from revealing or stealing, can to the user using terminal progress Password Input into
Row authentication, to determine display format of the present bit password in terminal.
For example, authentication can be carried out to user using the biological characteristics such as fingerprint, iris mode, can also pass through
The form of Questions carries out authentication to user.
It is understood that when carrying out authentication to user, verification mode can be used alone, and can also combine
It uses, is not specifically limited herein.
The 304th, if authentication by present bit password by not being converted to invisible form;
In the present embodiment, if present bit password can be converted to invisible form by user not by authentication.
Specifically, when user does not pass through authentication, then it is not the owner of terminal to mean user, nonterminal yet
Owner set other trust users, in order to ensure the security of Password Input, present bit password can be converted to not
Visible form, when such as current plane is numerical ciphers, present bit password can be shown with the character style of *.Wherein, at end
After end obtains present bit password input by user, present bit password directly in the form of invisible can show rather than
It is shown in a visible form temporary, then invisible shape is converted to after the next bit Password Input of present bit password
Formula.
305th, present bit password is shown according to invisible form;
In the present embodiment, after present bit password is converted to invisible form, it can be shown currently according to invisible form
Position password.
Step 303 to step 305 in the present embodiment can perform before step 302, can also be with step 305 simultaneously
It performs, is not specifically limited herein.
306th, whether correct present bit password is detected, if so, step 307 is performed, if it is not, then performing step 308;
307th, the preset touch response region of the next bit password of present bit password is increased according to the first preset rules;
308th, when present bit password mistake, and when present bit password is the first password, then keep all after the first password
The preset touch response region of position password is constant or, according to all passwords after the first password of the second preset rules reduction
Preset touch response region.
Step 306 in the present embodiment is identical to step 205 with the step 203 in embodiment illustrated in fig. 2 to step 308,
Details are not described herein again.
The cipher-code input method in the embodiment of the present invention is illustrated above, below to close in the embodiment of the present invention
Code input unit illustrates:
Referring to Fig. 4, cipher input one embodiment in the embodiment of the present invention includes:
Acquiring unit 401, for obtaining present bit password input by user;
Whether detection unit 402 is correct for detecting present bit password;
Increasing unit 403, for when current password is correct, then increasing according to the first preset rules under present bit password
The preset touch response region of one password.
In the present embodiment, detection unit 402 passes through the correctness for the present bit password that detection inputs so that increasing unit
403 when present bit password is correct, can increase the preset touch response region of the next bit password of present bit password, so as to big
The serious forgiveness of the big next bit password for increasing present bit password of knowing clearly, and the click accuracy of Password Input is improved, also avoid
Password due to multiple input error and caused by input efficiency it is low.
Optionally, in some embodiments of the invention, based on Fig. 4, referring to Fig. 5, device can further include:
First processing units 404 for working as present bit password mistake, and when present bit password is the first password, are then kept
The preset touch response region of all passwords after the first password is constant or, reduces the first password according to the second preset rules
The preset touch response region of all passwords afterwards.
Optionally, in some embodiments of the invention, based on Fig. 5, referring to Fig. 6, device can further include:
Second processing unit 405, for when present bit password is the first password, the preset touch of the first password being kept to ring
It answers region constant or, increases the preset touch response region of the first password according to the first preset rules.
Optionally, in some embodiments of the invention, based on Fig. 6, referring to Fig. 7, device can further include:
Converting unit 406, for present bit password to be converted to invisible form;
Display unit 407, for showing present bit password according to invisible form.
Optionally, in some embodiments of the invention, based on Fig. 7, referring to Fig. 8, device can further include:
Authentication unit 408, for carrying out authentication to user;
Trigger element 409, for when authentication not by when, then trigger converting unit and be converted to present bit password not
Visible form.
The cipher input in the embodiment of the present invention is described in the angle of slave module functional entity above, under
Face is described the computer installation in the embodiment of the present invention from the angle of hardware handles:
Referring to Fig. 9, Computer device one embodiment of the embodiment of the present invention includes:
Processor 901 and memory 902;
For storing computer program, processor 901 is used to perform the computer stored in memory 902 memory 902
During program, following steps can be realized:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902
When, it can also realize following steps:
When present bit password mistake, and when present bit password is the first password, then keep all positions after the first password close
The preset touch response region of code is constant or, according to the default of all passwords after the first password of the second preset rules reduction
Touch-control response region.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902
When, it can also realize following steps:
When present bit password is the first password, keep the preset touch response region of the first password constant or, according to the
The preset touch response region of the first password of one preset rules increase.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902
When, it can also realize following steps:
Present bit password is converted into invisible form;
Present bit password is shown according to invisible form.
In some embodiments of the invention, processor 901 is used to perform the computer program stored in memory 902
When, it can also realize following steps:
Authentication is carried out to user;
If authentication is not by triggering the step of present bit password is converted to invisible form.
It is understood that when the processor in the computer installation of above description performs the computer program, also may be used
To realize the function of each unit in above-mentioned corresponding each device embodiment, details are not described herein again.Illustratively, the computer journey
Sequence can be divided into one or more module/units, and one or more of module/units are stored in the memory
In, and performed by the processor, to complete the present invention.One or more of module/units can be can complete it is specific
The series of computation machine program instruction section of function, the instruction segment are used to describe the computer program in such as described Password Input
Implementation procedure in device.For example, the computer program can be divided into each unit in above-mentioned cipher input, respectively
Unit can realize the concrete function as described in above-mentioned corresponding cipher input.
The computer installation can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set
It is standby.The computer installation may include but be not limited only to processor, memory.It will be understood by those skilled in the art that processor,
Memory is only the example of computer installation, does not form the restriction to computer installation, can be included more or fewer
Component either combines some components or different components, such as the computer installation can also be set including input and output
Standby, network access equipment, bus etc..
The processor can be central processing unit (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable GateArray, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng the processor is the control centre of the computer installation, utilizes various interfaces and the entire computer installation of connection
Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module that are stored in the memory and the data being stored in memory are called, described in realization
The various functions of computer installation.The memory can mainly include storing program area and storage data field, wherein, store program
It area can storage program area, application program needed at least one function etc.;Storage data field can store the use according to terminal
Data created etc..In addition, memory can include high-speed random access memory, non-volatile memories can also be included
Device, such as hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are consolidated
State memory device.
The present invention also provides a kind of computer readable storage medium, calculating is stored on the computer readable storage medium
Machine program when computer program is executed by processor, can realize following steps:
Obtain present bit password input by user;
Whether correct detect present bit password;
If so, the preset touch response region of the next bit password according to the first preset rules increase present bit password.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, it can also realize following steps:
When present bit password mistake, and when present bit password is the first password, then keep all positions after the first password close
The preset touch response region of code is constant or, according to the default of all passwords after the first password of the second preset rules reduction
Touch-control response region.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, it can also realize following steps:
When present bit password is the first password, keep the preset touch response region of the first password constant or, according to the
The preset touch response region of the first password of one preset rules increase.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, it can also realize following steps:
Present bit password is converted into invisible form;
Present bit password is shown according to invisible form.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, it can also realize following steps:
Authentication is carried out to user;
If authentication is not by triggering the step of present bit password is converted to invisible form.
If it is understood that the integrated unit is realized in the form of SFU software functional unit and is independent production
Product are sold or in use, can be stored in a corresponding computer read/write memory medium.Based on such understanding, this hair
The bright all or part of flow realized in above-mentioned corresponding embodiment method, can also be instructed relevant by computer program
Hardware is completed, and the computer program can be stored in a computer readable storage medium, which is being located
It manages when device performs, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program generation
Code, the computer program code can be source code form, object identification code form, executable file or some intermediate forms
Deng.The computer-readable medium can include:Any entity of the computer program code or device, record can be carried
It is medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only memory (ROM, Read-OnlyMemory), random
Access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs
It is noted that the content that includes of the computer-readable medium can be according to legislation in jurisdiction and patent practice will
It asks and carries out appropriate increase and decrease, such as in some jurisdictions, do not included according to legislation and patent practice, computer-readable medium
Electric carrier signal and telecommunication signal.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit may be referred to the corresponding process in preceding method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
Division is only a kind of division of logic function, can there is other dividing mode, such as multiple units or component in actual implementation
It may be combined or can be integrated into another system or some features can be ignored or does not perform.It is another, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit
It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical location, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
That unit is individually physically present, can also two or more units integrate in a unit.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Embodiment is stated the present invention is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding
The technical solution recorded in each embodiment is stated to modify or carry out equivalent substitution to which part technical characteristic;And these
Modification is replaced, and the essence of appropriate technical solution is not made to depart from the spirit and scope of various embodiments of the present invention technical solution.
Claims (10)
1. a kind of cipher-code input method, applied to terminal, which is characterized in that including:
Obtain present bit password input by user;
Whether correct detect the present bit password;
If so, increase the preset touch response region of the next bit password of the present bit password according to the first preset rules.
2. according to the method described in claim 1, it is characterized in that, the detection present bit password it is whether correct it
Afterwards, the method further includes:
When the present bit password mistake, and when the present bit password is the first password, then after keeping the first password
The preset touch response region of all passwords is constant or, according to all after the second preset rules reduction the first password
The preset touch response region of position password.
3. method according to claim 1 or 2, which is characterized in that it is described obtain present bit password input by user it
Before, the method further includes:
When the present bit password is the first password, keeps the preset touch response region of the first password constant or, press
According to the preset touch response region of the first preset rules increase the first password.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
The present bit password is converted into invisible form;
The present bit password is shown according to the invisible form.
5. according to the method described in claim 4, it is characterized in that, by the present bit password be converted to invisible form it
Before, the method further includes:
Authentication is carried out to the user;
If the authentication is not by triggering the described the step of present bit password is converted to invisible form.
6. a kind of cipher input, applied to terminal, which is characterized in that including:
Acquiring unit, for obtaining present bit password input by user;
Whether detection unit is correct for detecting the present bit password;
Increasing unit, for when the current password is correct, then increasing the present bit password according to the first preset rules
The preset touch response region of next bit password.
7. device according to claim 6, which is characterized in that described device further includes:
First processing units for working as the present bit password mistake, and when the present bit password is the first password, are then kept
The preset touch response region of all passwords after the first place password is constant or, according to described in the reduction of the second preset rules
The preset touch response region of all passwords after the first password.
8. the device according to claim 6 or 7, which is characterized in that described device further includes:
Second processing unit, for when the present bit password is the first password, keeping the preset touch of the first password
Response region is constant or, increases the preset touch response region of the first password according to first preset rules.
9. a kind of computer installation, it is characterised in that:The computer installation includes processor, and the processor is deposited for performing
It is realized during the computer program stored in reservoir as described in any one in claim 1 to 5 the step of cipher-code input method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program
It is realized when being executed by processor as described in claim 1 to 5 any one the step of cipher-code input method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711347330.8A CN108108112A (en) | 2017-12-15 | 2017-12-15 | A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711347330.8A CN108108112A (en) | 2017-12-15 | 2017-12-15 | A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108108112A true CN108108112A (en) | 2018-06-01 |
Family
ID=62216226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711347330.8A Pending CN108108112A (en) | 2017-12-15 | 2017-12-15 | A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108108112A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321692A (en) * | 2019-07-12 | 2019-10-11 | 网易(杭州)网络有限公司 | Cipher-code input method, device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072510A1 (en) * | 2009-09-23 | 2011-03-24 | At&T Intellectual Property I.L.P. | Apparatus, methods, and computer program products for entering secure passwords |
CN104182678A (en) * | 2014-04-24 | 2014-12-03 | 东莞盛世科技电子实业有限公司 | Password verifying device and password verifying method |
CN106293439A (en) * | 2015-06-04 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Interface alternation method and device |
CN106570366A (en) * | 2016-11-09 | 2017-04-19 | 深圳怡化电脑股份有限公司 | Password input method and device based on touch screen |
-
2017
- 2017-12-15 CN CN201711347330.8A patent/CN108108112A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072510A1 (en) * | 2009-09-23 | 2011-03-24 | At&T Intellectual Property I.L.P. | Apparatus, methods, and computer program products for entering secure passwords |
CN104182678A (en) * | 2014-04-24 | 2014-12-03 | 东莞盛世科技电子实业有限公司 | Password verifying device and password verifying method |
CN106293439A (en) * | 2015-06-04 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Interface alternation method and device |
CN106570366A (en) * | 2016-11-09 | 2017-04-19 | 深圳怡化电脑股份有限公司 | Password input method and device based on touch screen |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321692A (en) * | 2019-07-12 | 2019-10-11 | 网易(杭州)网络有限公司 | Cipher-code input method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10496804B2 (en) | Fingerprint authentication method and system, and terminal supporting fingerprint authentication | |
CN105279405B (en) | Touchscreen user button behavior pattern is built and analysis system and its personal identification method | |
CN103200011B (en) | A kind of cipher authentication method and device | |
CN104636649A (en) | Electronic equipment and guiding method thereof | |
CN107340966A (en) | Terminal control method and device, computer installation and storage medium | |
JP5985632B2 (en) | Information processing apparatus, information processing method, and information processing program | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
EP3779765B1 (en) | Radio frequency card function calling method and device | |
CN104992089A (en) | Security verification method and system based on touch screen technology | |
CN105929974A (en) | Password input management method and mobile terminal | |
CN105094874A (en) | Application starting method and system | |
CN107895105A (en) | A kind of cipher processing method, terminal device and computer-readable recording medium | |
CN106779722A (en) | The method of payment and mobile terminal of a kind of mobile terminal | |
CN107769928A (en) | A kind of terminal and computer-readable recording medium | |
CN108171048A (en) | Password prompt method, apparatus, storage medium and terminal | |
CN103714457A (en) | Method for validating a transaction | |
CN107274174A (en) | The auth method and mobile terminal of a kind of mobile payment | |
CN106991343A (en) | Secure payment device and its safe payment method | |
CN109688150A (en) | A kind of multi-platform account interoperability methods and device | |
CN105701383B (en) | A kind of function triggering method, device and terminal | |
CN108108112A (en) | A kind of cipher-code input method and device, computer installation, readable storage medium storing program for executing | |
CN107633174A (en) | A kind of user inputs management method and device, terminal | |
CN106778344B (en) | A kind of data permission control method and terminal | |
CN105653054A (en) | Code processing method and apparatus | |
CN106845180A (en) | Verify identity method, using and computing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180601 |